Friday, February 26, 2010

Encryption of Mobile Devices

There has been much written over the past few years about the risk of data loss through mobile devices, either by losing the devices or having them hacked. Numerous stories have been published detailing the losses experienced by particular companies and the consequences. Sometimes the consequences have been severe. Accordingly, considerable emphasis has been placed on techniques to prevent or mitigate the loss of data on such devices. One of the techniques that receives the most prominence is that of encryption.

There are various was to implement encryption. The referenced article for this post outlines three software packages that can be used. Each has its own pros and cons. But it is important for companies to address this area in their security strategy. With the rapid growth in power of mobile devices, the issue is becoming more urgent. The article is at this site.

No comments: